She Tried to Download Instagram. It Locked Her Out of Her PC.
- Roger Theophanous
- Mar 29
- 2 min read
A company director wanted to check Instagram activity on her PC.
She searched online, found a download link, clicked it, installed it.
Within seconds, her screen was taken over.
Full-screen payment demand. No way to close it. Every time she tried to open something else, it forced itself back on top.
She tried Ctrl + Alt + Delete. Task Manager. Restarting the machine.
Nothing worked.
She was completely locked out of her own computer.
What actually happened
This wasn’t a hack.
It was a fake app designed to hijack the screen and push for payment.
No breach. No advanced attack.
Just a normal search and the wrong click.
Getting control back
We connected remotely.
The challenge wasn’t removing it, it was taking control of the machine first.
Opened Task Manager. Forced it to stay visible using “always on top”. Found the process overriding the screen and killed it.
That stopped the lockout immediately.
From there:
Removed the application
Ran a full security scan
Checked nothing else had embedded itself
Back up and running
The machine was usable again within minutes.
No payment made. No data lost. No wider issue.
What had already burned time was shut down quickly once handled properly.

The real issue
The problem wasn’t the malware.
It was how easily it got in.
No restrictions on installing software. No guardrails. No friction.
One download was enough to stop someone working completely.
What changed after
We didn’t just fix it.
We made sure it doesn’t happen again.
App installations now require approval
Security policies tightened
Quick briefing on what to look out for
What this shows
This is how most issues start.
Not with something sophisticated, just normal behaviour at the wrong moment.
The difference is whether it gets handled in minutes, or drags on and becomes something bigger.

What Business Owners Can Learn From This Incident
This story is a clear example of how everyday actions can lead to IT problems. It is not always complex cyber attacks that cause damage. Often, it is simple mistakes combined with lack of controls.
Business owners and directors should:
Limit software installation rights to trusted personnel only
Use proactive IT support to monitor and manage devices
Train staff on cyber security for SMEs, including how to avoid fake apps
Implement endpoint security tools to detect and block threats early
Work with an IT support company UK that understands their industry needs
Taking these steps reduces risk and helps maintain smooth business operations.
Final Thoughts
The director’s experience shows how quickly a business can be disrupted by a single wrong click. The good news is that with the right IT support, problems can be fixed quickly and without lasting damage.
